In accordance with the global needs of heavy metal-contaminated site remediation, this book systematically introduces the latest theories and technical achievements of microbial and chemical treatment for the chromium pollution in the chromium slag and chromium-contaminated soil, combined with the author's research achievements over the decades. The book focuses on the biological and chemical behavior of chromium in soil, microbial, and chemical remediation for the chromium-contaminated soil and the cases of chromium-contaminated site remediation project. This book is used by the scientific researchers and engineering technicians engaged in chromium chemical industry and environmental protection. It is also used as a textbook and reference book for graduate students in environmental science and engineering, soil science, chemistry and chemical engineering, and other related fields.
17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings
17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings
This book constitutes the refereed proceedings of the 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, held in Ottawa, Canada, in May 2004. The 129 revised full papers presented were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on neural networks, bioinformatics, data mining, general applications, autonomous agents, intelligent systems, knowledge processing and NLP, intelligent user interfaces, evolutionary computing, fuzzy logic, human-roboter interaction, computer vision and image processing, machine learning and case-based reasoning, heuristic search, security, Internet applications, planning and scheduling, constraint satisfaction, e-learning, expert systems, applications to design, machine learning, and image processing.
Bio-Inspired Computation and Applications in Image Processing summarizes the latest developments in bio-inspired computation in image processing, focusing on nature-inspired algorithms that are linked with deep learning, such as ant colony optimization, particle swarm optimization, and bat and firefly algorithms that have recently emerged in the field. In addition to documenting state-of-the-art developments, this book also discusses future research trends in bio-inspired computation, helping researchers establish new research avenues to pursue. - Reviews the latest developments in bio-inspired computation in image processing - Focuses on the introduction and analysis of the key bio-inspired methods and techniques - Combines theory with real-world applications in image processing - Helps solve complex problems in image and signal processing - Contains a diverse range of self-contained case studies in real-world applications
This book constitutes the refereed proceedings of the Third International Conference on Grid and Pervasive Computing, GPC 2008, held in Kunming, China, in May 2008. The 45 revised full papers presented together with 2 keynote lectures were carefully reviewed and selected from 184 submissions. The papers cover all current issues of grid and pervasive computing and focus on topics such as cluster computing, grid computing, high performance computing, network storage, peer-to-peer computing, pervasive computing, the Semantic Web and the Semantic Grid, and service-oriented computing.
Skillfully blending Eastern and Western Thought, Mater Yang illuminates the traditional teachings as well as offers scientific explanations and a contemporary understanding of Taiji practice. In this book, Yang describes the core exercises that form the foundation of Taiji practice, and explains the purpose and necessary integration of these exercises to achieve the full health and martial, physical and spiritual benefits of Taiji training. As both a traditionally trained expert of Taijiquan and a scientist studying the mechanisms and benefits of Taiji practice, Yang uniquely demystifies Taijiquan and makes it more accessible to a Wwestern audience. Carefully preserving and drawing from classical Taiji writings and the oral traditions of the Chinese martial arts community, Yang also suggests ground-breaking hypothesis to explain the mechanisms of how and why Taiji practices are so widely beneficial. This book is valuable to both beginning and advanced practitioners.
Data Quality provides an exposé of research and practice in the data quality field for technically oriented readers. It is based on the research conducted at the MIT Total Data Quality Management (TDQM) program and work from other leading research institutions. This book is intended primarily for researchers, practitioners, educators and graduate students in the fields of Computer Science, Information Technology, and other interdisciplinary areas. It forms a theoretical foundation that is both rigorous and relevant for dealing with advanced issues related to data quality. Written with the goal to provide an overview of the cumulated research results from the MIT TDQM research perspective as it relates to database research, this book is an excellent introduction to Ph.D. who wish to further pursue their research in the data quality area. It is also an excellent theoretical introduction to IT professionals who wish to gain insight into theoretical results in the technically-oriented data quality area, and apply some of the key concepts to their practice.
This book provides a comprehensive look at one-dimensional (1D) mesoporous inorganic nanomaterials. Beginning with a systematic presentation of their characterization using advanced electron microscopy techniques, the book discusses how to design the growth of 1D nanomaterials in order to achieve different, application-targeted morphologies such as nanowires, nanorods, nanofibers, nanotubes, and nanobelts. Subsequently, the book systematically summarizes current state-of-the-art research activities, encompassing energy conversion and storage, catalysis, sensing, and adsorption. The book concludes with a forward-looking summary of the different prospects of these materials for novel energy applications, as well as the challenges faced regarding their mass production, cost-effective synthesis strategies, and a deep understanding of the physics involved in the microstructure-dependent performance. Featuring broad and up-to-date coverage of this rapidly growing field, this book is useful for researchers working at the intersections of materials science, chemistry, and advanced energy devices.
This book focuses on control techniques for LCL-type grid-connected inverters to improve system stability, control performance and suppression ability of grid current harmonics. Combining a detailed theoretical analysis with design examples and experimental validations, the book offers an essential reference guide for graduate students and researchers in power electronics, as well as engineers engaged in developing grid-connected inverters for renewable energy generation systems.
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
This book introduces the latest research developments in composite nanomaterials and summarizes the fundamentals and technical approaches in synthesis, fabrication and processing of composite nanomaterials. The author describes the intrinsic relationship between the catalytic properties and the physical and chemical effects in the composite materials, providing for theoretical and technical bases for effectively developing novel electrocatalyst - applications of the nanocomposites in energy conversion areas.
FLINS, originally an acronym for Fuzzy Logic and Intelligent Technologies in Nuclear Science, is now extended to Computational Intelligence for applied research. The contributions to the ninth in the series of FLINS conferences cover state-of-the-art research, development, and technology for computational intelligence systems ? both from foundations and applications points-of-view.
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.
The exploding number of uses for ultrafast, ultrasmall integrated circuits has increased the importance of hot-carrier effects in manufacturing as well as for other technological applications. They are rapidly movingout of the research lab and into the real world. This book is derived from Dr. Takedas book in Japanese, Hot-Carrier Effects, (published in 1987 by Nikkei Business Publishers). However, the new book is much more than a translation. Takedas original work was a starting point for developing this much more complete and fundamental text on this increasingly important topic. The new work encompasses not only all the latest research and discoveries made in the fast-paced area of hot carriers, but also includes the basics of MOS devices, and the practical considerations related to hot carriers. Chapter one itself is a comprehensive review of MOS device physics which allows a reader with little background in MOS devices to pick up a sufficient amount of information to be able to follow the rest of the book The book is written to allow the reader to learn about MOS Device Reliability in a relatively short amount of time, making the texts detailed treatment of hot-carrier effects especially useful and instructive to both researchers and others with varyingamounts of experience in the field The logical organization of the book begins by discussing known principles, then progresses to empirical information and, finally, to practical solutions Provides the most complete review of device degradation mechanisms as well as drain engineering methods Contains the most extensive reference list on the subject
Advanced Driver Intention Inference: Theory and Design describes one of the most important function for future ADAS, namely, the driver intention inference. The book contains the state-of-art knowledge on the construction of driver intention inference system, providing a better understanding on how the human driver intention mechanism will contribute to a more naturalistic on-board decision system for automated vehicles. - Features examples of using machine learning/deep learning to build industry products - Depicts future trends for driver behavior detection and driver intention inference - Discuss traffic context perception techniques that predict driver intentions such as Lidar and GPS
This book gives a survey of the physics and fabrication of carbon nanotubes and their applications in optics, electronics, chemistry and biotechnology. It focuses on the structural characterization of various carbon nanotubes, fabrication of vertically or parallel aligned carbon nanotubes on substrates or in composites, physical properties for their alignment, and applications of aligned carbon nanotubes in field emission, optical antennas, light transmission, solar cells, chemical devices, bio-devices, and many others. Major fabrication methods are illustrated in detail, particularly the most widely used PECVD growth technique on which various device integration schemes are based, followed by applications such as electrical interconnects, nanodiodes, optical antennas, and nanocoax solar cells, whereas current limitations and challenges are also be discussed to lay the foundation for future developments.
Access to Mobile Services focuses on methods for accessing broadcast based M-services from multiple wireless channels. This book presents a novel infrastructure that provides a multi-channel broadcast framework for mobile users to effectively discover and access composite M-services. Multi-channel algorithms are proposed for efficiently accessing composite services. Access to Mobile Services provides an in-depth survey of wireless data access and motivates the need to treat mobile services differently. A wireless adaptation of Service Oriented Architecture (SOA) is also covered. Designed for researchers and practitioners who work in the general area of mobile services, this book is also suitable for advanced-level students in computer science. Forewords by: Michael P. Papazoglou, Tilburg University, The Netherlands Fabio Casati, University of Trento, Italy
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
This is the first mechatronics book dealing with coupled mechanical and electrical actions, an emerging branch of modern technology. Authored by the leading scientist in this field, the book treats various subjects along the interface between mechanics and electronics.
This book shows that with the use of metamaterials, one can have coherent THz signal generation, amplification, transmission, and detection for phase-arrayed CMOS transistors with significantly improved performance. Offering detailed coverage from device to system, the book describes the design and application of metamaterials in actual CMOS integrated circuits, includes real circuit examples and chip demonstrations with measurement results, and also evaluates system performance after CMOS-based system-on-chip integration. The book reflects the latest research progress and provides a state-of-the-art reference on CMOS-based metamaterial devices and mm-wave and THz systems.
This is the first comprehensive book on human/animal gene responses to RNA viral infections, including prevalent, emerging and re-emerging RNA viruses such as HIV, SARS-CoV, West Nile virus, influenza virus and many others. Human gene responses are reviewed by leading virologists worldwide in the following aspects: (i) the altered gene expression profiles at the transcriptional and translational levels detected with cutting-edge technologies such as cDNA microarray and proteomics; (ii) host innate and adapted immune responses to viral replication in target organs; (iii) virus-activated signal transduction pathways in cell survival, apoptosis and autophagosomal pathways; and (iv) the small interfering RNA/microRNA-mediated gene silencing pathway, a recently characterized new host defense mechanism against viral infection. Organized into 29 highly accessible and well-illustrated chapters, this volume explores state-of-the-art knowledge of the molecular mechanisms of RNA virus infection and host?virus interactions. This comprehensive compilation of the altered gene expression profiles and signal transduction pathways in host cells in response to the majority of human/animal RNA viruses opens new directions for basic and clinical research on viral pathogenesis, and also provides valuable biomarkers for researchers to select gene targets in the development of diagnostic tests and antiviral therapeutics for a number of infectious diseases.
This book is a rigorous, unified account of the fundamental principles of the density-functional theory of the electronic structure of matter and its applications to atoms and molecules. Containing a detailed discussion of the chemical potential and its derivatives, it provides an understanding of the concepts of electronegativity, hardness and softness, and chemical reactivity. Both the Hohenberg-Kohn-Sham and the Levy-Lieb derivations of the basic theorems are presented, and extensive references to the literature are included. Two introductory chapters and several appendices provide all the background material necessary beyond a knowledge of elementary quantum theory. The book is intended for physicists, chemists, and advanced students in chemistry.
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing which contains a comprehensive overview, the latest pioneering work and future research direction of a research topic.
Fundamental Physicochemical Properties of Germanene-related Materials: A Theoretical Perspective provides a comprehensive review of germanene-related materials to help users understand the essential properties of these compounds. The book covers various germanium complex states such as germanium oxides, germanium on Ag, germanium/silicon composites and germanium compounds. Diverse phenomena are clearly illustrated using the most outstanding candidates of the germanium/germanene-related material. Delicate simulations and analyses are thoroughly demonstrated under the first-principles method, being fully assisted by phenomenological models. Macroscopic phenomena in chemical systems, including their principles, practices and concepts of physics such as energy, structure, thermodynamics and quantum chemistry are fully covered. Germanium-based materials play critical roles in the basic and applied sciences, as clearly revealed in other group-IV and group-V condensed-matter systems. Their atomic configurations are suitable for creating the active chemical bonding among the identical and/or different nearest-neighboring atoms leading to diverse physical/chemical/material environments. - Provides a comprehensive review of germanene-related materials with a physicochemical and theoretical foundation that is useful for readers in understanding the essential properties of these compounds - Presents a unique theoretical framework under single and multi-hybridization theory - Contains significant combinations with phenomenological and experimental measurements - Focuses on the study of macroscopic phenomena in chemical systems in terms of their principles, practices and concepts of physics such as energy, structure, thermodynamics and quantum chemistry
This is not a purely mathematical book. It presents the basic principle of wavelet theory to electrical and electronic engineers, computer scientists, and students, as well as the ideas of how wavelets can be applied to pattern recognition. It also contains many novel research results from the authors' research team.
This book systematically presents the technical aspects of supercritical water oxidation and supercritical water gasification for energy and environmental applications, which include reactor design, construction materials, corrosion, salt precipitation, etc. The book provides a comprehensive introduction to the properties of supercritical water, and the industrial applications, reaction mechanisms and reaction kinetics of supercritical water oxidation (SCWO) and supercritical water gasification (SCWG). The reactions occurring in supercritical water are complex, and studying their reaction mechanisms is of great importance for the development of supercritical water processing technologies. Accordingly, the book explains the oxidative mechanisms and kinetics of organic matter in supercritical water in detail. However, the harsh reaction conditions in supercritical water can easily create severe reactor corrosion and salt deposition problems. Therefore, the book also comprehensively reports on the mechanism analysis, state of research, and development trends regarding these two problems. Lastly, the book summarizes the development of supercritical water processing technologies, including studies on SCWO and SCWG, as well as near-zero-emission systems of pollutants based on SCWO technology. In short, the book provides a wealth of valuable information for all readers who are interested in using SCWO for organic waste treatment, and in using SCWG for hydrogen production with wet biomass.
3D Bioprinting in Tissue and Organ Regeneration covers state-of-the-art advances and applications in bioprinting. Beginning with an introduction that considers techniques, bioinks and construct design, the authors then move onto a detailed review of applications of bioprinting in different biomedical fields (skin, cartilage, bone, vascularized tissue, etc.). This is followed by a chapter overview of intraoperative bioprinting, which is widely considered one of the important future trends in this area. Finally, the authors tackle ethical and regulation concerns regarding the utilization of bioprinting.The book is written by three global experts for an audience of students and professionals with some basic knowledge of bioprinting, but who seek a deeper understanding of the biomedical applications involved in bioprinting. - Introduces readers to bioprinting modalities, as well as pre-bioprinting, bioprinting and post-bioprinting procedures - Focuses on biomedical applications used in bioprinting in chapters specific to skin, cartilage, bone and vascularized tissue - Provides readers with original ideas from engineering and clinical points-of-view that are based on the authors' extensive experience in this field, as well as the possibilities of future translation of bioprinting technologies from bench to bedside
This book will be a one-stop-shop for readers seeking information on biofibers that are sustainable and environmentally friendly and those that can replace the non-renewable synthetic polymer based fibers. Emphasis will be on fibers that are derived from agricultural byproducts and coproducts without the need for additional natural resources.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.